There are two distinct Sounds that of the physical world and that of the Soul or how I can determine what is artificial and what is not.

Sri GregO: Of course, any weapon system, say a Colt 45 pistol to the head leaves so much brain trauma to any Hindu Guru, which is not worthy of discussion. Within the realm of human reasoning, and yes I know of many that can go beyond it, please consider the source of the following article(S):

"If You See Something Say Something"

These Studies Have Know To Cause Non-Infectious Meningitis

Causes

Non–infectious meningitis causes include

•Cancers

•Systemic lupus erythematosus (lupus)

•Certain drugs

•Head injury

•Brain surgery

Transmission

This type of meningitis is not spread from person to person. Non-infectious meningitis can be caused by cancers, systemic lupus erythematosus (lupus), certain drugs, head injury, and brain surgery.

Signs & Symptoms

Meningitis infection is characterized by a sudden onset of fever, headache, and stiff neck. It is often accompanied by other symptoms, such as

"The events at the international political scene, in the last few years, confirm that the concept of remote control of human brain is a matter of negotiations. In January 1999 the European Parliament passed a resolution where it calls for an international convention introducing a global ban on all developments and deployments of weapons which might enable any form of manipulation of human beings."

MIND CONTROL WEAPON

September 9 2008

The term “Mind control” basically means covert attempts to influence the thoughts and behavior of human beings against their will (or without their knowledge), particularly when surveillance of an individual is used as an integral part of such influencing and the term “Psychotronic Torture” comes from psycho (of psychological) and electronic. This is actually a very sophisticated form of remote technological torture that slowly invalidates and incapacitates a person. These invisible and non-traceable technological assaults on human beings are done in order to destroy someone psychologically and physiologically. Actually, as par scientific resources, the human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity. We are on the threshold of an era in which these data processors of the human body may be manipulated or debilitated.

Definition of psychotronic (psycho-physical) weapons Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means (techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden, forced influences on the psyche of a person for the purpose of modifying his consciousness, behavior and health for what is desired in the way of influencing aspects of control..." This is not only dangerous, this is deadly!"

The First phase is the harassment/surveillance program.

They use Echelon, Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs, homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family, friends. The isolation is needed to have access to the person to conduct many of the experiments on them.

The second phase is the assaults of Directed Energy Weapons.

After a victim becomes isolated from everyone in the world. The victim now having feelings of regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During this time many have been implanted with microchips. Many begin experiencing extreme pain to their head. Some hear voices. Then pain is delivered to various other parts of their bodies. The pain is delivered by Directed Energy Weapons.

Directed Energy Weapons.

Some of the weapons were known as non-lethal weapons. They use such weapons as extremely low frequency Elf electromagnetic weapons (which has been used in mind control), acoustics, harmonics (which have been used as a mind control technique), ultrasound, microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic energy beam can be used to induce "considerable agitation and muscular activity" or "induce muscular weakness and lethargy" this weapon is know as Ultra High Frequency EM. Psychological warfare tactics are being used against unsuspecting citizens to destroy their jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to utterly destroy a person, very often resulting in a person taking his or her own life, or ending up in a mental hospital. This has been taking place for years and nothing is ever said about it. Nothing is ever written about it. Some people also experience electronic harassment. This is extremely distressing, painful and invasive, and feels like one's mind and body is undergoing constant rape, 24 hours a day, 7 days a week. The technology used to do this is unknown, but hundreds of victims report the same physical sensations and experiences. Many take their lives in an attempt to escape the horror. The technology involves the use of electromagnetic waves of various frequencies to achieve different results. Some frequencies will make a person tired, while others may cause confusion or memory loss. "Electronic harassment" or e-harassment is a catch-all term used to describe a group of circumstances which a large number of people are currently experiencing in common.

In October 2010, the congressman Denis J. Kucinich introduced in the American Congress A bill, obliging the American president to get engaged in the negotiations aimed at the ban of space based weapons. In this bill the definition of a weapon system includes: any other unacknowledged or as yet undeveloped means inflicting death or injury on, od damaging or destroying, a person(or the biological life, bodily health, mental health, or physical and economic well-being of a person) through the use of land-based, sea-based, or space-based systems using radiation, electromagnetic, psychotronic, sonic, laser, or other energies directed at individual persons or targeted populations or the purpose of information war, mood management, or mind control of cush persons or populations. As in all legislative acts quoted in this article the bill counts with sound, light or electromagnetic stimulation of human brain. Psychotronic fweapons remain, at least for a layman uninformed of secret military research, in the sphere of science fiction, since so far none of the published scientific experiments was presented in the way which would allow for its replication.

That it is feasible to manipulate human behavior with the use of subliminal, either sound or visual, messages is now generally known. This is why in most of the countries the use of such technologies, without consent of the user, is banned. Devices using light for the stimulation of the brain show another way how the light flashing in certain frequencies could be used for the manipulation of human psychic life. As for the sound, a report on

persons at whom the beam of sound waves is targeted, appeared last year in the world newspapers.

The beam is formed by a combination of sound and ultrasound waves which causes that a person targeted by this beam hears the sound inside of his head. Such a perception could easily convince the human being that it is mentally ill. The acts presented in this article suggest that with the development of technology and knowledge of the functioning of human brain new ways of manipulation of human mind keep emerging. One of them seem to be the electromagnetic energy.

BRAIN-MACHINE INTERFACE Robert Asher, Sandia National Laboratories June 2002,Arlington, Virginia

Increasingly, the human is being asked to take in multisensory inputs, to make near-instantaneous decisions on these inputs, and to apply control forces to multitask and control machines of various sorts. The multitasking, multisensor environment stresses the human, yet, more and more s/he being asked to operate in such an environment. As an example, the visionary project on uninhabited combat vehicles discusses an increased workload in piloting combat vehicles. DARPA has a brain-machine interface program about to start. This program has as its goal human ability to control complex entities by sending control actions without the delay for muscle activation. The major application for this program is control of aircraft. The intent is to take brain signals and use them in a control strategy and then to impart feedback signals back into the brain.

The DARPA program could be extended to include a broader range of potential impact by including the possibility of other applications: learning and training, automobile control, air traffic control, decision-making, remote sensing of stress, and entertainment. Learning and training might be implemented as information coded into brain signals and then input into the person. Air traffic control in increasingly busy skies can use such capability: the controller has multiple inputs from multiple aircraft. These can be input into his brain in a 3-D aspect and an alertness signal used to “wake him up” when his attention drifts beyond acceptable limits. Not only intellectual data might be passed from one person to another without speaking, but also emotional and volitional information. Decision making may become more precise as emotional, fatigue, and other cognitive states can be appraised prior to making a critical decision. The potential impact on automobile safety is great. The driver can have quicker control of his automobile (Fig. E.15), allowing for safer driving while reducing the car-to-car spacing on congested highways. This would help alleviate highway congestion and the need for more highways. Furthermore, it would allow for safer driving as driver attention can be measured and the driver “alerted” or told in some manner to pay attention to his or her driving when attention wanders beyond safe margins. It can allow for detection of driver impairment so that the vehicle may be made either not to start or to call emergency. Direct connection into the brain could yield a revolution in entertainment,

MATRIX-style, into the midst of a movie or educational show. Can you imagine the impact of being immersed in a fully 3-D audio-visual simulation of the battle of Gettysburg?

Hands-off control of an automobile through a device for reading and implanting brain waves.

Role of Converging Technologies

Nano. The brain-machine interface effort will require nanotechnologies in order to make the required experimental measurements and to implement the devices for both receiving brain electromagnetic signals and transmitting signals back into the brain.

Bio. This is a highly biological, neuroscience effort, which requires detailed understanding and measurements of the brain’s electromagnetic activity. It requires a significant measurement protocol.

Cogno. This effort by its very nature will directly affect the cognitive aspects of the individual by externally applied electromagnetic fields by implanting information for the individual. Thus, this effort can lead to increased learning and other cognitive results.

Transforming Strategy to Reach the Vision

To achieve these goals, enter a partnership with DARPA to fund additional technologies and applications that would enhance the brain-machine interface effort. Work should be focused on the goals of using the technologies for cognitional aspects, understanding memory, and learning brain function to be able to design devices to increase their capabilities.

Estimated Implications

This effort would yield a technological revolution, in applications from computers to entertainment. It would give the United States a global competitive advantage while yielding solutions to specific domestic problems such as air traffic control and highway safety in increasingly crowded environments. It will revolutionize education. This effort will yield devices that may be applied to a number of activities and be sufficiently small as to be wearable in a car or at home.

i. International Research. Research involving human subjects who are not U.S. citizens or DOD personnel, conducted outside the United States, and its territories and possessions, requires permission of the host country. The laws, customs, and practices of the host country and those required by this instruction will be followed. An ethics review by the host country, or local Naval IRE with host country representation, is required. j. Classified Research. Classified research with human subjects is held to the same ethical principles and human subject protections as unclassified research and must receive prior approval from the Secretary of Defense (SECDEF) (SECDEF Memorandum of December 13, 1999) . Classified research is not eligible for review under expedited review procedures as noted in reference (n)

A. Research includes, but is not limited to, any project, task, test, pilot study, experiment, investigation, study, clinical study, clinical investigation, clinical trial, evaluation, developmental effort or similar undertaking, whether or not conducted or supported under a program that is officially considered research. Any effort, even if not considered research for other purposes, is considered research for purposes of this instruction.

EUROPA - TARGETED INDIVIDUALS

The human mind has never been a simple project. Because of its complexity and plasticity, it has yet not been completely understood. Under the dark ages of brain research, scientists have nevertheless learned how to stimulate and partially control the human brain's responses. At any time it has been done, it has caused pain and suffering for the owner of the brain: the human subject.

Backed up by the "best" scientists, sponsored by the military and the secret service, thousands of individuals have their lives destroyed in the quest of developing technologies that are not science fiction anymore.

The human brain, is seen as a computer where information can be downloaded and from where information can be uploaded. Cloning the individual's brain and nervous system is the only hope today's scientists have to understand the human brain and develop advanced artificial intelligence and synthetic telepathy, allowing people to communication by thought, not speech. The European and World countries governments, faced with this "challenge" are unable to protect their citizens against the greatest possible

violations of their human rights. There are no excuses whatsoever for researchers to destroy people's and entire families lives. Under the secrecy of "national security", they violate human rights conventions and every universal human right a human being is born with, going deep into the very consciousness of the person that is affected.

DIRECTED ENERGY PROFESSIONAL SOCIETY

These Directed Energy (DE) internships are concerned with the research, development and testing of high energy laser and high power microwave components, systems and effects at Federal laboratories and universities at sites around the country. Most of these positions are made possible by funding from the High Energy Laser Joint Technology Office.

Internship Qualifications These paid summer internship positions are available for currently enrolled undergraduate and graduate students at U.S. colleges and universities. Positions are open to U.S. citizens only. The disciplines include but are not limited to these: science - physics, chemistry engineering - electrical, optical, chemical, mechanical, and materials mathematics and computer science

Position Descriptions Generally, interns will work for the summer in a laboratory or university under the tutelage of full time researchers. Work may include experimental, theoretical, or computer modeling and simulation, depending on the position. Specific work assignments, hours and pay will vary. Organizations The organizations below are expected to offer these internships in 2012. Advertising for open positions will begin in December 2011.

Another view of spontaneous magnetic field fluctuations have been influenced by studies of spatial (neuroanatomical) brain localization using concomitant fMRI techniques. They have suggested the existence of spontaneous, regional, above baseline activity in the normal eyes closed, resting state. This activity is particularly pronounced in medial prefrontal, parietal and both posterior and anterior cingulate, and is suppressed during goal-directed

In two state, task-no task, experimental designs, the resting activity, “default activation, ” has been speculated to reflect spontaneous, task unrelated, images and thoughts (Greicius & Menon, 2004; Greicius et al., 2004; Raichle ME et al., 2001; Vincent et al., 2007). These transient mental events in the eyes closed, resting condition have also been called “daydreaming” (Singer, 1966 ), “task-unrelated-thoughts,” TUTs(Giambra, 1989), “unrest at rest”(Buckner & Vincent, 2007), “wandering minds,” and “stimulus independent thought”, SITs (Gilbert et al., 2007). Psychologists that have studied inner life subjectively, William James (James, 1902) and Sigmund Freud (Freud, 1914/1955 among many others, have focused on these autonomously arising transient streams of free associations and imagery. James analogized them to the turbulent eddies of the hydrodynamic flow of consciousness which he believed these transients to be among the universal properties of the conscious human brain. Examinations of a subject’s spontaneous 4 internal activity as exteriorized by the psychoanalytic instruction, “…say everything that comes to your mind…” has been central to the practice of psychoanalysis for over a Century {Fenichel, 1945 #8190). It appears that the ostensibly resting “default brain activity” in the “default network” persists in monkeys through anesthesia-induced changes in states of consciousness (Vincent et al., 2007). This result is consistent with a several decade history of research using priming, evoked potentials and task recovery paradigms to demonstrate implicit, working memorial events that occur during even surgical anesthesia (Jordon et al., 2000). The implied relationship between 2-5 second epochs of MEG activation such as that seen below in Fig. 5 as intermittent helical vortices (we call them strudels) and TUT or SIT-like subjective phenomena must remain entirely speculative.

General Premise and Hypothesis It is the underlying premise of this pilot study of intrinsic brain magnetic field fluctuations that they manifest signatory patterns in transformations and measures which can discriminate among global brain states. We examine this premise by partially isolating and qualitatively and quantitatively characterizing 12.5, 54, 180 or 240 seconds of eyes closed, resting spontaneous magnetic field activity in ten resting controls and ten medicated schizophrenic probands. From our previous 5 work in brain-related physiological systems (Mandell, 1979; Mandell, 1983b; Mandell, 1987; Mandell et al., 1982; Mandell & Selz, 1993), a more specific hypothesis is suggested:

6. Our approach to MEG-derived signals abrogates source orientation, localization and inverse problem tools such as leadfield matrices (Dale & Sereno, 1993; Hamalainen et al., 1993), adaptive synthetic aperture magnetometer, SAM, beamformer techniques, or projection onto Talairached MRI image reconstructed volumes (Dalal et al., 2008; Dalal et al., 2004). For these approaches to this data set, see Rutter et al (Rutter et al., 2009). In their study of spontaneous activity in the eyes closed, resting state, they found a statistically significant decrement in the amplitudes of MEG recorded posterior regional gamma (30-70Hz+) activity in schizophrenic patients compared with normal controls (Rutter et al., 2009). In that study as well as these, a high pass, 0.6 Hz, as well as 60, 120, 180 and 240 Hz notch filters were routinely applied to the individual sensor records before the computation of the sensor pair ssds(i), (the difference between the two sensor). It is our presupposition that the “… spontaneous activity… all over the brain…”(Sekihara et al., 2008) reflects global and neurophysiologically meaningful patterns of complex neuronal activity-generated magnetic field fluctuations in interaction with MEG SQUID sensors (Barone A & G., 1982; Braiman & Wiesenfeld, 1994). A magnetic flux applied to the SQUID magnetometer, gives rise to a circulating current, which in turn modulates the inductance of the autonomously oscillatory Josephson junctions (Landberg et al., 1966; Levi et al., 1977). The great sensitivity of the SQUID devices permits measuring changes in magnetic field associated with even a single flux quantum.

7. If a constant biasing current is maintained in the SQUID device, it is the voltage which is modulated by changes in phase at junctions. Phase at Josephson junctions is sensitive to the quanta of magnetic flux. We dismiss a common generalization of many MEG practitioners that most or all local polarities of the intrinsic magnetic field noise “cancel out.” In the context of the somewhat analogous magnetic dynamo problem: “…given a flow in a conducting fluid, will a small seed magnetic field amplify exponentially with time…” (Finn & Ott, 1988)--we show below that ssds(i)s do-- it was argued that the magnetic flux loops nonuniformly stretch and fold into themselves manifesting only partial cancellation and diffuse fine scale oscillations, in a process which can be quantified by a fractional cancellation exponent (Ott et al., 1992) and measures made on temporal-spatial intermittency.

In addition, if some currents run parallel to magnetic fields, which is expected to be the case with poorly localized, multiple neocortical neuronal sources, the magnetic field lines may follow a variety of

dynamical shapes in which the magnetic pressure gradient is balanced by the magnetic tension. For example, there may not be any Lorentz force, J x B = 0, leading to a measurable field configuration without any net electrical current at all. We thus don’t infer a particular neuronal current source (or event) for the data series. Characterizing the fluctuations allows the elucidation of patterns in the brain’s global magnetic field flux dynamics without reference to anatomical location (Clarke, 1994).

8 example, we find a common dynamical pattern often involves intermittently appearing, multiple time scale helical vortices. We call them unwindable strudels lest they lead to the brain being called a critically loaded sand pile that spawns avalanches (Beggs & Plenz, 2005; Levina et al., 2007)). In comparison with the several second time resolution of fMRI, the MEG’s superior temporal resolution, ~ 1 ms, combined with its “underdetermined” weaknesses with respect to specific brain localization when used alone (Hamalainen et al., 1993; Im et al., 2005; Lee et al., 2007; Sarvas, 1987; Uutela et al., 1998), suited our goal of characterizing magnetic field (rather than inferred neuronal) properties of what has been called intrinsic physiological brain noise (Nagarajan et al., 2006; Sekihara et al., 1997; Sekihara et al., 2005). The use of ssds(i) exploits the hemispheric symmetry of the human brain (Geschwind, 1970) and serves several purposes: (1) It imposes a natural gauge (distance serves as a traveling, local normalization procedure; (3) The ssdi (i) reduces the penetrance of electromagnetic field correlates of blink, cough, and movement as well as the cardiac and respiratory artifacts that both symmetric sensors generally share; (4) Using ssds(i) instead of the raw MEG time series tends to cancel the symmetrically shared generic MEG (and EEG) Δ, Θ, α, β, and γ modes, as well as other patterns of bihemispheric covariance; (5) Advantageous from the magnetic field point of view is the fact that using ssds(i) makes issues of 9 neuronal current source location moot; ; the spatial sensitivity profile of the ssds(i) considered as a virtual sensor typically covers a large volume of the brain. The techniques similar to that used here of paired sensor difference series, ssds(i), have been used to reduce or remove the mean and double or more the higher moments in analyses of nonstationary neural membrane conductance noise (Conti et al., 1980; DeFelice, 1977; Sigworth, 1981).

NAVAL - research laboratory experiments (NRL) Florida

The beam is formed by a combination of sound and ultrasound waves which causes that a person targeted by this beam hears the sound inside of his head. Such a perception could easily convince the human being that it is mentally ill. The acts presented in this article suggest that with the development of technology and knowledge of the functioning of human brain new ways of manipulation of human mind keep emerging. One of them seem to be the electromagnetic energy.

Pentagon report investigated lasers that put voices in your head February 18, 2008 by Lisa Zyga

A recently unclassified report from the Pentagon from 1998 has revealed an investigation into using laser beams for a few intriguing potential methods of non-lethal torture.Some of the applications the report investigated include putting voices in people's heads, using lasers to trigger uncontrolled neuron firing, and slowly heating the human body to a point of feverish confusion - all from hundreds of meters away.

A US citizen requested access to the document, entitled "Bioeffects of Selected Non-Lethal Weapons," under the Freedom of Information Act a little over a year ago. There is no evidence that any of the technologies mentioned in the 10-year-old report have been developed since the time it was written The report explained several types of non-lethal laser applications, including microwave hearing, disrupted neural control, and microwave heating. For the first type, short pulses of RF energy (2450 MHz) can generate a pressure wave in solids and liquids. When exposed to pulsed RF energy, humans experience the immediate sensation of "microwave hearing" - sounds that may include buzzing, ticking, hissing, or knocking that originate within the head. Studies with guinea pigs and cats suggest that the mechanism responsible for the phenomenon is thermoelastic expansion. Exposure to the RF pulses doesn´t cause any permanent effects, as all effects cease almost immediately after exposure ceases.

As the report explains, tuning microwave hearing could enable communicating with individuals from a distance of up to several hundred meters. The report explains:

"The phenomenon is tunable in that the characteristic sounds and intensities of those sounds depend on the characteristics of the RF energy as delivered... Because the frequency of the sound heard is dependent on the pulse characteristics of the RF energy, it seems possible that this technology could be developed to the point where words could be transmitted to be heard like the spoken word, except that it could only be heard within a person´s head."

In one experiment, communication of the words from one to ten using ´speech modulated´ microwave energy was successfully demonstrated. Microphones next to the person experiencing the voice could not pick up these sounds. Additional development of this would open up a wide range of possibilities." The report predicts that communicating at longer distances would be possible with larger equipment, while shorter range signals could be generated with portable equipment. Putting voices in people´s heads could cause what the report calls "psychologically devastating" effects. The technology might even allow for communicating with an individual hostage surrounded by captors, although this would require "extreme directional specificity. With another weapon, electromagnetic pulses could be used to disrupt the brain´s functioning, although this technology was still in the theoretical stages at the time. Under normal conditions, all brain structures function with specific rhythmic activity depending on incoming sensory information.

Sometimes, the brain synchronizes neuronal activity in order to focus on a specific task, but the degree of neuronal synchronization is highly controlled. However, under certain conditions (such as physical stress or heat stroke), more areas of the brain can fire in a highly synchronized manner, and may begin firing uncontrollably. The report describes a method for replicating this highly synchronized neuron firing across distances of several hundred meters. High-voltage (100 kV/m) electromagnetic pulses lasting for one nanosecond could trigger neurons to fire, disrupting the body´s controlled firing activity. Short-term effects may include loss of consciousness, muscle spasms, muscle weakness, and seizures lasting for a couple minutes. These high-voltage pulsed sources, which would require an estimated frequency of 15 Hz, exist today.

Another form of non-lethal torture described in the report is microwave heating. By raising the temperature of the body to 41°C (105.8°F), humans can experience sensations such as memory loss and disorientation, and exhibit reduced aggression. According to the report, humans can survive temperatures up to 42°C (107.6°F), at which time prolonged exposure can result in permanent brain damage or death. The microwave heating technique was tested on a Rhesus monkey, where a 225 MHz beam caused an increase in the animal´s body temperature. Depending on the dosage level, the temperature increase occurred within a time of 15 to 30 minutes. After the beam was removed, the animal´s body temperature decreased back to normal. The report suggests the technique could be useful for controlling crowds or in negotiations. While the investigations reveal intriguing techniques for non-lethal torture, the report does not mention plans for carrying out specific experiments or studies in the future.

DARPA - nanotechnology

1.Military Defense Robotics

Machines Will Rise: Becoming Self Aware The Department of Defense is building robots for the Pentagon. It has been seen as a move that could advance AI research and move the Defense robotics industry into the New Age. As viewed in our Exoskeleton section one of the leading manufactures in the exoskeleton arena is a company called Cyberdyne Technologies. Industry experts are already predicting that when the soldier steps out of this unit the exoskeleton will be able to operate autonomously.

2.NANO SOLDIERS A New Industrial Revolution In January 2000, U.S. President Bill Clinton requested a $227-million increase in the government's investment in nanotechnology research and development, which included a major initiative called the National Nanotechnology Initiative (NNI). This initiative nearly doubled America 's 2000 budget investment in nanotechnology, bringing the total invested in nanotechnology to $497 million for the 2001 national budget. In a written statement, White House officials said that "nanotechnology is the new

frontier and its potential impact is compelling." About 70 percent of the new nanotechnology funding will go to university research efforts, which will help meet the demand for workers with nanoscale science and engineering skills. The initiative will also fund the projects of several governmental agencies, including the National Science Foundation , the Department of Defense , the Department of Energy , the National Institutes of Health , NASA and the National Institute of Standards and Technology. Much of the research will take more than 20 years to complete, but the process itself could touch off a new industrial revolution. Nanotechnology is likely to change the way almost everything, including medicine, computers and cars, are designed and constructed. Nanotechnology is anywhere from five to 15 years in the future, and we won't see dramatic changes in our world right away.

A Short History of Nanotechnology

1959 Feynman gives after-dinner talk describing molecular machines building with atomic precision 1974 Taniguchi uses term "nano-technology" in paper on ion-sputter machining 1977 Drexler originates molecular nanotechnology concepts at MIT 1981 First technical paper on molecular engineering to build with atomic precision STM invented 1985 Buckyball discovered 1986 First book published AFM invented First organization formed 1987 First protein engineered First university symposium 1988 First university course 1989 IBM logo spelled in individual atoms First national conference 1990 First nanotechnology journal Japan's STA begins funding nanotech projects 1991 Japan''s MITI announces bottom-up "atom factory" IBM endorses bottom-up path Japan's MITI commits $200 million Carbon nanotube discovered 1992 First textbook published First Congressional testimony 1993 First Feynman Prize in Nanotechnology awarded for modeling a hydrogen abstraction tool useful in nanotechnology First coverage of nanotech from White House "Engines of Creation" book given to Rice administration, stimulating first university nanotech center 1994 Nanosystems textbook used in first university course US Science Advisor advocates nanotechnology 1995 First think tank report First industry analysis of military applications Feynman Prize in Nanotechnology awarded for synthesis of complex three-dimensional structures with DNA molecules 1996 $250,000 Feynman Grand Prize announced First European conference NASA begins work in computational nanotech First nanobio conference 1997 First company founded: Zyvex First design of nanorobotic system Feynman Prize in Nanotechnology awarded for work in computational nanotechnology and using scanning probe microscopes to manipulate molecules 1998 First NSF forum, held in conjunction with Foresight Conference First DNA-based nanomechanical device Feynman Prize in Nanotechnology awarded for computational modeling of molecular tools for atomically-precise chemical reactions and for building molecular structures through the use of self-organization

1999 First Nanomedicine book published

First safety guidelines Congressional hearings on proposed National Nanotechnology Initiative Feynman Prize in Nanotechnology awarded for development of carbon nanotubes for potential computing device applications and for modeling the operation of molecular machine designs 2000 President Clinton announces U.S. National Nanotechnology Initiative First state research initiative: $100 million in California Feynman Prize in Nanotechnology awarded for computational materials science for nanostructures and for building a molecular switch 2001 First report on nanotech industry U.S. announces first center for military applications Feynman Prize in Nanotechnology awarded for theory of nanometer-scale electronic devices and for synthesis and characterization of carbon nanotubes and nanowires 2002 First nanotech industry conference Regional nanotech efforts multiply Feynman Prize in Nanotechnology awarded for using DNA to enable the self-assembly of new structures and for advancing our ability to model molecular machine systems 2003 Congressional hearings on societal implications Call for balancing NNI research portfolio Drexler/Smalley debate is published in Chemical & Engineering News Feynman Prize in Nanotechnology awarded for modeling the molecular and electronic structures of new materials and for integrating single molecule biological motors with nano-scale silicon devices 2004 First policy conference on advanced nanotech First center for nanomechanical systems Feynman Prize in Nanotechnology awarded for designing stable protein structures and for constructing a novel enzyme with an altered function 2005 At Nanoethics meeting, Roco announces nanomachine/nanosystem project count has reached 300 Feynman Prize in Nanotechnology awarded for for designing a wide variety of single molecular functional nanomachines and for synthesizing macromolecules of intermediate sizes with designed shapes and functions

assembly, and for producing complex two-dimensional arrays of DNA nanostructures 2007 Feynman Prize in Nanotechnology awarded for construction of molecular machine systems that function in the realm of Brownian motion, and molecular machines based upon two-state mechanically interlocked compounds 2008 Technology Roadmap for Productive Nanosystems released Protein catalysts designed for non-natural chemical reactions Feynman Prize in Nanotechnology awarded for work in molecular electronics and the synthesis of molecular motors and nanocars, and for theoretical contributions to nanofabrication and sensing 2009 An improved walking DNA nanorobot Structural DNA nanotechnology arrays devices to capture molecular building blocks Design 'from scratch' of a small protein that performed the function performed by natural globin proteins Organizing functional components on addressable DNA scaffolds Feynman Prize in Nanotechnology awarded for experimental demonstrations of mechanosynthesis using AFM to manipulate single atoms, and for computational analysis of molecular tools to build complex molecular structures 2010 DNA-based 'robotic' assembly begins Feynman Prize in Nanotechnology awarded for work in single atom manipulations and atomic switches, and for development of quantum mechanical methods for theoretical predictions of molecules and solids 2011 First programmable nanowire circuits for nanoprocessors DNA molecular robots learn to walk in any direction along a branched track Mechanical manipulation of silicon dimers on a silicon surface

MORE INFORMATIONS...."! MINISTRY OF DEFENCE IN AMERICA HAVE SECRET CODE - " PILOT STUDY"!!! *************************************** THAT IS EXPERIMENT OF NAVAL-DARPA ON CIVILIANS PEOPLES! - international research of MINISTRY OF DEFENCE AMERICA - secret research MINISTRY OF DEFENCE AMERICA - "Ministry of defence" of each country NATA - NATO from 1980 participate with DARPA-NAVAL! - NATO - "RTO research technology organisation"

Sunday, July 28, 2013

*You might have to listen to it a few times if it goes over your head. But if you are persistent, you will get the message.

We do not
need to wait for a miracle, reinvesting in passenger rail, Rural Road
maintenance, and Freight Lines from Del Rio, Laredo, and Eagle Pass, would just
take an investment of profits paid by oil resources. The return on investment
would not only save Billions is wasteful sending on border control but regain
trusted relations with our South American Neighbors and a balance in economic trade.

The
construction and new routes of roads and freight train rail are already in the
works by oil companies to gain access to Eagle Ford Shale in South Central
Texas. Why not keep on moving forward with rebuilding by laying new Passenger
Railroad ties, where once the old systems lay, mass transportation
infrastructure lost by inexpensive fuel consuming air travel over the last 30
years in South Central Texas.

Intrusion into your personal space, by persons or networks of mindless electronic devices, plagiarizers and patent trolls has robbed you of your creativity, spirituality, copyrights, income, and dreams.

Where Do We Go From Here Innovative Protective Devices Stock to Climb

After the surveillance disaster and global meltdown by those of public trust, who cannot be trusted; a new horizon in device innovation is on the rise to protect the privacy of all United States Citizens. There is no limit to the design and manufacturing of trustworthy protective devices and targeting of those who entered our homes and bodies with the most vile disgusting Wi-Fi behavioral control devices that stole away our lives and savings!

It Will Keep Us Safer

Prosecution The Only Solution

Crimes Against Humanity

Trigger Economic Prosperity

Why Do We Need A Sequester? Just Go Down My List And Drop Every Single Department. These organizations do not respond to valid complaints of abuse, covert acts, and even homicide.90 Days Ago Background For ADA Complaints, turn to Criminal Charges Sent To The United States Justice Department Criminal Justice Civil Rights, Main

Texas Aerospace Domestic Surveillance

Part I

“Human Research Outside of Protocol”

Texas Aerospace Domestic Surveillance

Part II

“The School Of Hard Knocks”

Mary's condition started to improve once we put all the pieces together and she realized what was happening to both of us: we were being attacked by aerospace hyper-surveillance. In other words, she was not losing her mind; her intuition was in fact true.

My sophomoric attitude of thinking that the United States Government worked the way they taught in high school social studies changed to that of a street-smart Vietnam veteran. Hyper-surveillance made us hyper-vigilant, like a couple of cats!

Knowledge might have been power but it had an adverse impact on me emotionally. I slipped into disillusionment and clinical depression. We knew no matter what action we took we were going to be stalked mercilessly by the Secret Service, CIA, and the NSA—still a science fiction scenario to me.. I had several long talks with Mary about dropping out of school and moving to Siberia.

But I could not leave Mary home alone, so we decided to go back to school, side by side, and take whatever came our way. I followed protocol right out of the University manual step by step, even though it just made everybody more suspicious and angry. The subjects of electronic experimentation became the suspects; suspects became enemies of solid state.

Finally, I wrote a nice letter to Senator John Cornyn and got a screaming phone call from a private detective, who was part of a big money federal grant package for the then-unheard of Domestic Surveillance Program implemented by President Bush without the approval of Congress. I read about the detective that called me at home in an article written by Graeme Zielinski for San Antonio’s Express News paper.

"Former FBI Director William Sessions told the heavies of local law enforcement and security businesses congregated at the Oak Hills Country Club on Thursday that the new realities of international terrorism require constant cooperation among all agencies and with private firms.

And the top local cop was Sgt. Thomas Calucci of the University of Texas at San Antonio Police Department, who headed a team formed to identify folks on campus with psychological issues who could pose threats."

“If you have a nit of sense, you know there is no dividing line,” said Sessions, the former U.S. Attorney here and one-time federal judge who led the FBI from 1987 to 1993.

“We must share,” Sessions said, referring to the importance that intelligence holds in a post-Sept. 11, 2001, world. “We must find ways to do it.”

The information sharing was what concerned me most. The CIA, FBI, and Secret Service were established with a clear understanding that there is a dividing line between those that can operate in any way and means but did not share that information with the police.

In other words, if there is no dividing line then Texas is now a police state and I just acted as an informant to the FBI thinking that anything I said would be confidential.

Sessions’ statement—We must share, we must find ways to do it—scared the hell out of me. Not just for my own safety but that meant everybody except the police and political leaders would subjected to the rule of law, which leads to police corruption or what is known as a police state.

In a police state all a politico has to do is point his finger at you and they will come up with just cause for something. William Sessions was highly criticized for attacking the Branch Davidian Church in Waco, Texas, by establishing just cause through claiming psychologically programmed sleeper agents. However, during the congressional hearing the Feds claimed, “We had reason to believe they were manufacturing methamphetamine.” which has never been substantiated.

I am not criticizing Sessions trying to save the lives of children by any means he could. The point is: just cause is always a moot proposition. Who would argue against law enforcement to do everything in their power to protect children? And I do believe William Sessions is an honorable man.

Hindsight is 20/20. Judgmental views don't carry any weight when there was not a better man or woman for the job…period.

The Branch Davidian standoff occurred while I was in Guangzhou, China. I watched events unfold—viewing Texans lined up against barbwire fences along the farm to market road with barbecue pits lit and cooking brisket—on Chinese satellite TV in old Canton.

In 2006, the Bush Administration authorized the sharing of information collected by any means with law enforcement and civilian private security firms, including intrusive equipment by satellite or any surveillance devices not limited to electronic equipment. This presidential mandate was applied without congressional approval in Texas only!

This was an illegally incorporated private security firm on a Texas university authorized by Bush by way of Governor Rick Perry to carry out the domestic surveillance program and I was the justification; the person with psychological issues who could pose threats.

That just cause authorized them to investigate me and justified warrants signed by a biased Rick Perry-appointed judge to further their domestic surveillance—such as wiretapping and tracking devices—in my name.

What made matters worse, the Bush administration established funding for certain companies to manufacture these devices. The one that concerned me most was Digital Ally.

A press release dated October 6, 2006 stated:

Digital Ally…which develops, manufactures, and markets advanced technology products for law enforcement, homeland security, and commercial security applications, today announced that John Ashcroft and Judge William S. Sessions have joined the Company’s Advisory Board.

These electronic devices used in psychological programs such as MK-Ultra, a mid 20th century secret mind control research project, have been abused by Texas leadership. Behavioral political control networks and harmful biological or electronic devices exist and have been used against targeted peaceful political adversaries in a number of ways: illegal gathering of investigative information, intimidation, black listing, hacking, and human behavioral experiments that have caused harm and injury to unknown numbers of Texas citizens.

The only way that all of those civil liberties we think we have are persevered is by the United States Justice Department. However, the Bush Administration made a hit list of U.S. Attorneys and fired those not subservient to the Republican Party. For example, in early 2007 a U.S. Attorney in San Diego was fired a day after she served warrants in a criminal investigation of defense contractors with close GOP ties.

After George Bush was elected president in 2000, Rick Perry, then Lieutenant Governor, assumed the Governor’s office. It was Perry who issued executive order establishing a state Governor's Task Force on Homeland Security, also known as RP8.

“This executive order supersedes all previous orders and shall remain in effect and in full force until modified, amended, rescinded, or superseded by me [Governor Rick Perry] or by a succeeding Governor.”

Unfortunately, the order was still in effect as of his third election in 2010, giving the Texas Governor almost complete dictatorship, including more than 3,000 bias appointees, some embedded in the State Supreme Court creating a corrupt Texas justice system.

Texas also has a long history of using white supremacists for gun running, drug dealing, and human trafficking. Executive Order RP8 violated the civil and human rights of all Texas citizens clearly expressed by the Constitution of the United States. Governor Rick Perry used overt and covert acts against Texans solely to retain power and oppress the people of Texas in the name of national security, as justified by the Patriot Act.

He openly declared war on the United States and attempted succession from the Union without consideration of law abiding American patriots who reside in Texas and are United States citizens.

The Governor of Texas by virtue of the power and authority is legally responsible for, and is directly linked to, the abuse of federal funds by establishing RP8. The executive order led to political favors for state as well as federal employees who act without fear of prosecution as if above the law.

Rick Perry sat aloof of illegal acts as if by washing his hands releases him from any involvement as all others by his orders must suffer punishment by law as a consequence of his executive emergency order and their own illegal actions.

These favors and lawless orders were justified as a necessary evil to protect against an unidentified, fictitious enemy designated as terrorists, instead of specific persons or organizations that have attacked or plan to attack the United States or declare war. This fear of the unknown leads to an abuse of power by oppressing the populace with anti-ethical investigations and prosecutions of the innocent with unfounded conspiracy charges whenever the Governor of Texas cries wolf, or terrorism.

Every time Congress enacts a new law, no matter how trivial, we are stripped of our freedom to legislate our own actions, placing the burden of our behavior on law enforcement agencies. If Congress were to pass a law today that banned sex, very few people would obey the law nor would the police enforce it. However, if the law only applied to citizens and not politicians and police, it would lead to government corruption.

Likewise, congressional law makers know, no matter how rational a proposition may seem in theory, the only way to prove a legislative mandate benefits the greater good is after the law is applied. If a newly drafted law is the cause of bitter sweet or unjust consequences, the law is debated by a Congressional oversight committee and if necessary adjusted in some way or repealed.

The Patriot Act was enacted to protect civil liberties while protecting the United States from another attack. Emergency executive orders at the state level were approved and enacted to protect the United States as a whole from terrorism and rightly so: we had just been attacked.

Groups of conspiracy theorist considered the secrecy of certain Patriot Act provisions a cover up of political control. Those who openly expressed their opinions online were targeted by the very computer applications Ted “The Unabomber” Kaczynski warned about in his manifesto, known today as robo-executioners, a mindless data chip that shows no mercy at all!

The robo-executioner disarmed in 2009 was a horror story for Mary and me. The only way I knew how to protect us from attacks was to disclose that we were friendly on the Internet. I don't recommend this but when your life is in danger you do whatever can by any means to protect those that you love.

Mary and I knew that no matter what action we took we were going to be stalked mercilessly by criminal elements as well as protective agents who still did not who we were or what the hell we were trying to say!Why Do We Need A Sequester? Just Go Down My List And Drop Every Single Department. These organizations do not respond to valid complaints of abuse, covert acts, and even homicide.

18. Justice Victims of Crime denied 370,000 Dollars loss Tea Party Rebellion in 2009 (Governor Rick Perry Koch’s Brothers communication with the enemy force all employees to participate in Tea Party Rebellion April 2009) reported by myself and Susanne Cash While attending the University of Texas at San Antonio.

I was a 4.0 student and notice that my grades had been changed (2006) to the better or to say credits for classes I never attended. I reported this to Carol Gonzales UTSA as a whistleblower. Afterwards, I was Gang Stalked on and off campus, so I filed a Dallas OCR complaint that simply said “The University Quality Assurance Program is hardwired to favorable responses.”

Next, I was attacked verbally in front of 100 Anthropology Students, because I was late do to class due to disabled parking was moved where no healthy student would think to park, and the chair of the committee that made the change was the same Anthropology Professor, who attacked me and refused to sign a release so I could be a foreign exchange student. This same Professor was removed and retained a job at the University of Utah as head of the Disabled Department, later sued by the Department of Education for abuse and discrimination of the disabled. The same behavior of abuse follows these people wherever they go!

I contacted the Office of Civil Rights Dallas Texas so I could finish my degree and get away from the abuse. They sent me letter, after letter that I responded to each and every one and will swear in a court of law (and did in Blanco Court April 2009) all events where all witnessed and valid claims. Last week, they complained that I filed 22 grievances, most of which they requested from me!

They still have not work most of them! Belinda Cardenas was on the Board of Directors for UTSA at the same time the President of the University of El Paso, who with her co-conspirator Governor Rick Perry dis-validated my claims and put me and my extended family in danger of our lives. Rick Perry also sold our family oil rights to China (Chinese espionage and insurrection and Tea Party rebellion against the United States of America reported to the OIG 2009 and Henry Cuellar) and retaliated against our family by stopping the drilling on the most valuable piece of real state in Eagle Ford Shale, the lease will run out this year (My mother owns 1/50).

Congressional Representative Henry Cuellar spoke for me in Congress by Proxy, reading my statement requesting by 2/3 vote congress to remove Rick Perry from office for engaging in insurrection and Tea Party rebellion against the United States of America, fraud, and declaring war against the same. This is not the same Tea Party of today; this was a financed operation of Rick Perry and the Koch Brothers dealings with our enemy the Iranian governing power, and Chinese espionage regarding classified information and Eagle Ford Shale protected by the FBI as the “Private Sector.” Meanwhile back on our family farm, the Bush / Rick Perry CIA and Secret Service threatened my Father three times (2008), who told me after I returned from a Mexico College as a foreign exchange student; paid out of pocket by me because UTSA retaliated. I sent in a discloser statement to Taylor August Dallas OCR to let him know about the situation and that they threated my whole family.

Even though they threatened us, we did what they instructed and still suffered the consequences of their threats. A Doctor Medina was treating the whole family for stress and anxiety in fear for our lives, until he died unexpectedly. I am now, and my family is still being treated by Federal Psychiatrist to work through the trauma of the Stalking and Retaliation by Deadly Force by the State of Texas directly linked to Governor Rick Perry.

25. Senator Cornyn, concerning Political targeting by Texas Fusion Centers and Top Secret American, who can and do control all electronic power to my home and abused that power including intrusive surveillance. (2008,2009,2010,2011,2012) (Evidence sent to the FBI 2013).

26. Senator Ted Cruz Concerning all the conditions above (2013)

********************************

On line Complaints of Abuse Report:

1.Flag this message

DHS OIG Complaint Number C1307209Friday, March 15, 2013 10:56 PM

From: "DHS OIG" <DoNotReply@OIG.DHS.GOV>Add sender to Contacts

To: odellgregory@yahoo.com

You recently submitted a complaint to the DHS OIG via the OIG's online website. Your Complaint number is: C1307209. Complaints received at the OIG are reviewed to determine if DHS OIG investigation, or referral to a more appropriate entity, is warranted. If the allegation does not fall within the scope of DHS OIG's jurisdiction, then that information may be forwarded to the appropriate agency or authority for their review. This notification is not an indication your Complaint will be investigated by the DHS OIG or any other applicable investigating body. It is suggested you maintain a copy of this message for your records.

2. Flag this message

DHS OIG Complaint Number C1307206Friday, March 15, 2013 3:00 PM

From: "DHS OIG" <DoNotReply@OIG.DHS.GOV>Add sender to Contacts

To: odellgregory@yahoo.com

You recently submitted a complaint to the DHS OIG via the OIG's online website. Your Complaint number is: C1307206. Complaints received at the OIG are reviewed to determine if DHS OIG investigation, or referral to a more appropriate entity, is warranted. If the allegation does not fall within the scope of DHS OIG's jurisdiction, then that information may be forwarded to the appropriate agency or authority for their review. This notification is not an indication your Complaint will be investigated by the DHS OIG or any other applicable investigating body. It is suggested you maintain a copy of this message for your records.